All Projects → neoneggplant → Eggshell

neoneggplant / Eggshell

Licence: gpl-2.0
iOS/macOS/Linux Remote Administration Tool

Projects that are alternatives of or similar to Eggshell

Ms17 010 Python
MS17-010: Python and Meterpreter
Stars: ✭ 305 (-76.28%)
Mutual labels:  exploitation, metasploit, meterpreter
Hack Tools
The all-in-one Red Team extension for Web Pentester 🛠
Stars: ✭ 2,750 (+113.84%)
Mutual labels:  pentest-tool, metasploit, reverse-shell
trolo
trolo - an easy to use script for generating Payloads that bypasses antivirus
Stars: ✭ 45 (-96.5%)
Mutual labels:  reverse-shell, meterpreter, metasploit
Pakuri
Penetration test Achieve Knowledge Unite Rapid Interface
Stars: ✭ 125 (-90.28%)
Mutual labels:  pentest-tool, exploitation, metasploit
MsfMania
Python AV Evasion Tools
Stars: ✭ 388 (-69.83%)
Mutual labels:  reverse-shell, meterpreter, metasploit
A Red Teamer Diaries
RedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.
Stars: ✭ 382 (-70.3%)
Mutual labels:  metasploit, meterpreter
Subaru Starlink Research
Subaru StarLink persistent root code execution.
Stars: ✭ 432 (-66.41%)
Mutual labels:  exploitation, jailbreak
Sn1per
Attack Surface Management Platform | Sn1perSecurity LLC
Stars: ✭ 4,897 (+280.79%)
Mutual labels:  pentest-tool, pentest-scripts
Yasuo
A ruby script that scans for vulnerable & exploitable 3rd-party web applications on a network
Stars: ✭ 517 (-59.8%)
Mutual labels:  pentest-tool, pentest-scripts
Autosploit
Automated Mass Exploiter
Stars: ✭ 4,500 (+249.92%)
Mutual labels:  exploitation, metasploit
Hercules
HERCULES is a special payload generator that can bypass antivirus softwares.
Stars: ✭ 526 (-59.1%)
Mutual labels:  reverse-shell, meterpreter
Kaboom
A tool to automate penetration tests
Stars: ✭ 322 (-74.96%)
Mutual labels:  pentest-tool, pentest-scripts
Getaltname
Extract subdomains from SSL certificates in HTTPS sites.
Stars: ✭ 320 (-75.12%)
Mutual labels:  pentest-tool, pentest-scripts
Justtryharder
JustTryHarder, a cheat sheet which will aid you through the PWK course & the OSCP Exam. (Inspired by PayloadAllTheThings)
Stars: ✭ 450 (-65.01%)
Mutual labels:  pentest-tool, pentest-scripts
Hackerenv
Stars: ✭ 309 (-75.97%)
Mutual labels:  pentest-tool, pentest-scripts
Chimera
Chimera is a (shiny and very hack-ish) PowerShell obfuscation script designed to bypass AMSI and commercial antivirus solutions.
Stars: ✭ 463 (-64%)
Mutual labels:  information-security, reverse-shell
Lockdoor Framework
🔐 Lockdoor Framework : A Penetration Testing framework with Cyber Security Resources
Stars: ✭ 677 (-47.36%)
Mutual labels:  pentest-tool, pentest-scripts
Wpforce
Wordpress Attack Suite
Stars: ✭ 633 (-50.78%)
Mutual labels:  pentest-tool, reverse-shell
Exploitpack
Exploit Pack -The next generation exploit framework
Stars: ✭ 728 (-43.39%)
Mutual labels:  pentest-tool, exploitation
Pwncat
pwncat - netcat on steroids with Firewall, IDS/IPS evasion, bind and reverse shell, self-injecting shell and port forwarding magic - and its fully scriptable with Python (PSE)
Stars: ✭ 904 (-29.7%)
Mutual labels:  pentest-tool, reverse-shell

EggShell

About

EggShell is a post exploitation surveillance tool written in Python. It gives you a command line session with extra functionality between you and a target machine. EggShell gives you the power and convenience of uploading/downloading files, tab completion, taking pictures, location tracking, shell command execution, persistence, escalating privileges, password retrieval, and much more. This is project is a proof of concept, intended for use on machines you own.

Main menu

For detailed information and how-to visit http://lucasjackson.io/eggshell

Follow me on twitter: @neoneggplant


New In Version 3.0.0

  • More secure socket connection using SSL
  • Linux support
  • Tab completion
  • Improved over all structure and efficiency of session handling
  • Native iOS python support for 64 bit devices

Getting Started

  • Requires python 2.7

macOS/Linux Installation

git clone https://github.com/neoneggplant/eggshell
cd eggshell
python eggshell.py

iOS (Jailbroken)

Add Cydia source: http://lucasjackson.io/repo Install EggShell 3 Use any mobile terminal application and run the command eggshell

Main menu

Creating Payloads

Eggshell payloads are executed on the target machine. The payload first sends over instructions for getting and sending back device details to our server and then chooses the appropriate executable to establish a secure remote control session.

bash

Selecting bash from the payload menu will give us a 1 liner that establishes an eggshell session upon execution on the target machine

Bash payload

teensy macOS (USB injection)

Teensy is a USB development board that can be programmed with the Arduino ide. It emulates usb keyboard strokes extremely fast and can inject the EggShell payload just in a few seconds.

Teensy macOS payload

Selecting teensy will give us an arduino based payload for the teensy board.

Teensy macOS payload

After uploading to the teensy, we can use the device to plug into a macOS usb port. Once connected to a computer, it will automatically emulate the keystrokes needed to execute a payload.

Teensy macOS payload

Interacting with a session

Session interaction

After a session is established, we can execute commands on that device through the EggShell command line interface. We can show all the available commands by typing "help"

Command help

Taking Pictures

Session interaction

Both iOS and macOS payloads have picture taking capability. The picture command lets you take a picture from the iSight on macOS as well as the front or back camera on iOS.

Tab Completion

Similar to most command line interfaces, EggShell supports tab completion. When you start typing the path to a directory or filename, we can complete the rest of the path using the tab key.

Tab completion

Multihandler

The Multihandler option lets us handle multiple sessions. We can choose to interact with different devices while listening for new connections in the background.

Drawing

Similar to the session interface, we can type "help" to show Multihandler commands

Drawing

Featured

Featured in EverythingApplePro's video demonstrating an iOS 9.3.3 Webkit vulnerability used to run EggShell

EverythingApplePro


Special Thanks

  • Linus Yang / Ryley Angus for the iOS Python package
  • AlessandroZ for LaZagne

DISCLAMER

By using EggShell, you agree to the GNU General Public License v2.0 included in the repository. For more details at http://www.gnu.org/licenses/gpl-2.0.html. Using EggShell for attacking targets without prior mutual consent is illegal. It is the end user's responsibility to obey all applicable local, state and federal laws. Developers assume no liability and are not responsible for any misuse or damage caused by this program.


Commands

macOS

  • brightness : adjust screen brightness
  • cd : change directory
  • download : download file
  • getfacebook : retrieve facebook session cookies
  • getpaste : get pasteboard contents
  • getvol : get speaker output volume
  • idletime : get the amount of time since the keyboard/cursor were touched
  • imessage : send message through the messages app
  • itunes : iTunes Controller
  • keyboard : your keyboard -> is target's keyboard
  • lazagne : firefox password retrieval | (https://github.com/AlessandroZ/LaZagne/wiki)
  • ls : list contents of a directory
  • mic : record mic
  • persistence : attempts to re establish connection after close
  • picture : take picture through iSight
  • pid : get process id
  • prompt : prompt user to type password
  • screenshot : take screenshot
  • setvol : set output volume
  • sleep : put device into sleep mode
  • su : su login
  • suspend : suspend current session (goes back to login screen)
  • upload : upload file

iOS

  • alert : make alert show up on device
  • battery : get battery level
  • bundleids : list bundle identifiers
  • cd : change directory
  • dhome : simulate a double home button press
  • dial : dial a phone number
  • download : download file
  • getcontacts : download addressbook
  • getnotes : download notes
  • getpasscode : retreive the device passcode
  • getsms : download SMS
  • getvol : get volume level
  • home : simulate a home button press
  • installpro : install substrate commands
  • ipod : control music player
  • islocked : check if the device is locked
  • lastapp : get last opened application
  • locate : get device location coordinates
  • locationservice: toggle location services
  • lock : simulate a lock button press
  • ls : list contents of a directory
  • mic : record mic
  • mute : update and view mute status
  • open : open apps
  • openurl : open url on device
  • persistence : attempts to re establish connection after close
  • picture : take picture through the front or back camera
  • pid : get process id
  • respring : restart springboard
  • safemode : put device into safe mode
  • say : text to speach
  • setvol : set device volume
  • sysinfo : view system information
  • upload : upload file
  • vibrate : vibrate device

Linux

  • cd : change directory
  • download : download file
  • ls : list contents of a directory
  • pid : get process id
  • pwd : show current directory
  • upload : upload file
Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].